-
1
-
-
84878645187
-
An efficient biometric authentication protocol for wireless sensor networks
-
Althobaiti, O., Al-Rodhaan, M., Al-Dhelaan, A., An efficient biometric authentication protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw., 2013.
-
(2013)
Int. J. Distrib. Sens. Netw.
-
-
Althobaiti, O.1
Al-Rodhaan, M.2
Al-Dhelaan, A.3
-
2
-
-
84948714609
-
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
-
Amin, R., Biswas, G., A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36 (2016), 58–80.
-
(2016)
Ad Hoc Netw.
, vol.36
, pp. 58-80
-
-
Amin, R.1
Biswas, G.2
-
3
-
-
84979462212
-
Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network
-
Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Leng, L., Kumar, N., Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput. Netw. 101 (2016), 42–62.
-
(2016)
Comput. Netw.
, vol.101
, pp. 42-62
-
-
Amin, R.1
Islam, S.H.2
Biswas, G.3
Khan, M.K.4
Leng, L.5
Kumar, N.6
-
4
-
-
84962038954
-
Towards achieving data security with the cloud computing adoption framework
-
Chang, V., Ramachandran, M., Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9 (2016), 138–151.
-
(2016)
IEEE Trans. Serv. Comput.
, vol.9
, pp. 138-151
-
-
Chang, V.1
Ramachandran, M.2
-
5
-
-
84949545363
-
Cloud computing adoption framework: a security framework for business clouds
-
Chang, V., Kuo, Y.-H., Ramachandran, M., Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57 (2016), 24–41.
-
(2016)
Future Gener. Comput. Syst.
, vol.57
, pp. 24-41
-
-
Chang, V.1
Kuo, Y.-H.2
Ramachandran, M.3
-
6
-
-
84942767120
-
An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
-
Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J. Med. Syst. 39 (2015), 1–12.
-
(2015)
J. Med. Syst.
, vol.39
, pp. 1-12
-
-
Chaudhry, S.A.1
Mahmood, K.2
Naqvi, H.3
Khan, M.K.4
-
7
-
-
85008396468
-
An improved and provably secure privacy preserving authentication protocol for SIP
-
Chaudhry, S.A., Naqvi, H., Sher, M., Farash, M.S., Hassan, M.U., An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl., 2015.
-
(2015)
Peer-to-Peer Netw. Appl.
-
-
Chaudhry, S.A.1
Naqvi, H.2
Sher, M.3
Farash, M.S.4
Hassan, M.U.5
-
8
-
-
85029959630
-
An improved remote user authentication scheme using elliptic curve cryptography
-
Chaudhry, S.A., Naqvi, H., Mahmood, K., Ahmad, H.F., Khan, M.K., An improved remote user authentication scheme using elliptic curve cryptography. Wirel. Pers. Commun., 2016.
-
(2016)
Wirel. Pers. Commun.
-
-
Chaudhry, S.A.1
Naqvi, H.2
Mahmood, K.3
Ahmad, H.F.4
Khan, M.K.5
-
9
-
-
84995685454
-
A provably secure anonymous authentication scheme for session initiation protocol
-
Chaudhry, S.A., Khan, I., Irshad, A., Ashraf, M.U., Khan, M.K., Ahmad, H.F., A provably secure anonymous authentication scheme for session initiation protocol. Secur. Commun. Netw., 2016.
-
(2016)
Secur. Commun. Netw.
-
-
Chaudhry, S.A.1
Khan, I.2
Irshad, A.3
Ashraf, M.U.4
Khan, M.K.5
Ahmad, H.F.6
-
10
-
-
84954105714
-
A secure biometric based multi-server authentication scheme for social multimedia networks
-
Chaudhry, S.A., A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75 (2015), 12705–12725.
-
(2015)
Multimed. Tools Appl.
, vol.75
, pp. 12705-12725
-
-
Chaudhry, S.A.1
-
11
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen, T.-H., Shih, W.-K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32 (2010), 704–712.
-
(2010)
ETRI J.
, vol.32
, pp. 704-712
-
-
Chen, T.-H.1
Shih, W.-K.2
-
12
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D., Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14 (2014), 10081–10106.
-
(2014)
Sensors
, vol.14
, pp. 10081-10106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
13
-
-
33646779184
-
-
Errors in computational complexity proofs for protocols. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y., Errors in computational complexity proofs for protocols. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 624–643.
-
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
14
-
-
33747171940
-
The importance of proofs of security for key establishment protocols: formal analysis of jan-chen, yang-shen-shieh, kim-huh-hwang-lee, lin-sun-hwang, and yeh-sun protocols
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y., The importance of proofs of security for key establishment protocols: formal analysis of jan-chen, yang-shen-shieh, kim-huh-hwang-lee, lin-sun-hwang, and yeh-sun protocols. Comput. Commun. 29 (2006), 2788–2797.
-
(2006)
Comput. Commun.
, vol.29
, pp. 2788-2797
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
15
-
-
84864822381
-
Secure Key Establishment
-
Advances in Information Security, vol. 41.
-
K. Choo, 2009. Secure Key Establishment. Advances in Information Security, vol. 41.
-
(2009)
-
-
Choo, K.1
-
16
-
-
84959386693
-
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
-
Das, A.K., Sutrala, A.K., Kumari, S., Odelu, V., Wazid, M., Li, X., An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Netw. 9 (2016), 2070–2092.
-
(2016)
Secur. Commun. Netw.
, vol.9
, pp. 2070-2092
-
-
Das, A.K.1
Sutrala, A.K.2
Kumari, S.3
Odelu, V.4
Wazid, M.5
Li, X.6
-
17
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8 (2009), 1086–1090.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
18
-
-
84953352636
-
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
-
Das, A.K., A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 9 (2016), 223–244.
-
(2016)
Peer-to-Peer Netw. Appl.
, vol.9
, pp. 223-244
-
-
Das, A.K.1
-
19
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
-
Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M., An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36 (2016), 152–176.
-
(2016)
Ad Hoc Netw.
, vol.36
, pp. 152-176
-
-
Farash, M.S.1
Turkanović, M.2
Kumari, S.3
Hölbl, M.4
-
20
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo, P., Wang, J., Geng, X.H., Kim, C.S., Kim, J.-U., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15 (2014), 929–935.
-
(2014)
J. Internet Technol.
, vol.15
, pp. 929-935
-
-
Guo, P.1
Wang, J.2
Geng, X.H.3
Kim, C.S.4
Kim, J.-U.5
-
21
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D., Gao, Y., Chan, S., Chen, C., Bu, J., An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10 (2010), 361–371.
-
(2010)
Ad Hoc Sens. Wirel. Netw.
, vol.10
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
22
-
-
84963682665
-
One-to-many authentication for access control in mobile pay-tv systems
-
He, D., Kumar, N., Shen, H., Lee, J.-H., One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59 (2015), 1–14.
-
(2015)
Sci. China Inf. Sci.
, vol.59
, pp. 1-14
-
-
He, D.1
Kumar, N.2
Shen, H.3
Lee, J.-H.4
-
23
-
-
84949179531
-
Introduction to network simulator NS2
-
Springer US
-
Issariyakul, T., Hossain, E., Introduction to network simulator NS2. 2011, Springer US.
-
(2011)
-
-
Issariyakul, T.1
Hossain, E.2
-
24
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8 (2015), 1070–1081.
-
(2015)
Peer-to-Peer Netw. Appl.
, vol.8
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
25
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83 (2015), 2085–2101.
-
(2015)
Nonlinear Dyn.
, vol.83
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
26
-
-
84954436216
-
A privacy preserving three-factor authentication protocol for e-health clouds
-
Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. 72 (2016), 3826–3849.
-
(2016)
J. Supercomput.
, vol.72
, pp. 3826-3849
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
27
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Khan, M.K., Alghathbar, K., Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10 (2010), 2450–2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
28
-
-
84901008838
-
An improved user authentication protocol for healthcare services via wireless medical sensor networks
-
Khan, M.K., Kumari, S., An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw., 2014.
-
(2014)
Int. J. Distrib. Sens. Netw.
-
-
Khan, M.K.1
Kumari, S.2
-
29
-
-
84939573910
-
Differential Power Analysis
-
In: Wiener M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999, pp. 388-397. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B. 1999. Differential Power Analysis. In: Wiener M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999, pp. 388-397. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg.
-
(1999)
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
30
-
-
80052427734
-
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
-
In: (WiAd)
-
Kumar, P., Lee, H.-J., 2011. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: IEEE Wireless Advanced (WiAd), pp. 241–245.
-
(2011)
IEEE Wireless Advance
, pp. 241-245
-
-
Kumar, P.1
Lee, H.-J.2
-
31
-
-
84921608595
-
User authentication schemes for wireless sensor networks: a review
-
Kumari, S., Khan, M.K., Atiquzzaman, M., User authentication schemes for wireless sensor networks: a review. Ad Hoc Netw. 27 (2015), 159–194.
-
(2015)
Ad Hoc Netw.
, vol.27
, pp. 159-194
-
-
Kumari, S.1
Khan, M.K.2
Atiquzzaman, M.3
-
32
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li, X., Niu, J., Khan, M.K., Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36 (2013), 1365–1371.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
33
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J., A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58 (2013), 85–95.
-
(2013)
Math. Comput. Model.
, vol.58
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
34
-
-
84923216123
-
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
-
Li, X., Niu, J., Liao, J., Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 28 (2015), 374–382.
-
(2015)
Int. J. Commun. Syst.
, vol.28
, pp. 374-382
-
-
Li, X.1
Niu, J.2
Liao, J.3
Liang, W.4
-
35
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren, Y.-J., Shen, J., Wang, J., Han, J., Lee, S.-Y., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16 (2015), 317–323.
-
(2015)
J. Internet Technol.
, vol.16
, pp. 317-323
-
-
Ren, Y.-J.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.-Y.5
-
36
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X., Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17 (2015), 453–462.
-
(2015)
J. Commun. Netw.
, vol.17
, pp. 453-462
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Liu, Q.5
Sun, X.6
-
37
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
Shen, J., Tan, H.-W., Wang, J., Wang, J.-W., Lee, S.-Y., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16 (2015), 171–178.
-
(2015)
J. Internet Technol.
, vol.16
, pp. 171-178
-
-
Shen, J.1
Tan, H.-W.2
Wang, J.3
Wang, J.-W.4
Lee, S.-Y.5
-
38
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Shi, W., Gong, P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., 2013.
-
(2013)
Int. J. Distrib. Sens. Netw.
-
-
Shi, W.1
Gong, P.2
-
39
-
-
85019820843
-
Efficient location privacy algorithm for internet of things (iot) services and applications
-
Sun, G., Chang, V., Ramachandran, M., Sun, Z., Li, G., Yu, H., Liao, D., Efficient location privacy algorithm for internet of things (iot) services and applications. J. Netw. Comput. Appl., 2016.
-
(2016)
J. Netw. Comput. Appl.
-
-
Sun, G.1
Chang, V.2
Ramachandran, M.3
Sun, Z.4
Li, G.5
Yu, H.6
Liao, D.7
-
40
-
-
85019806828
-
L2p2: a location-label based approach for privacy preserving in lbs
-
Sun, G., Liao, D., Li, H., Yu, H., Chang, V., L2p2: a location-label based approach for privacy preserving in lbs. Future Gener. Comput. Syst., 2016.
-
(2016)
Future Gener. Comput. Syst.
-
-
Sun, G.1
Liao, D.2
Li, H.3
Yu, H.4
Chang, V.5
-
41
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
Turkanović, M., Brumen, B., Hölbl, M., A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20 (2014), 96–112.
-
(2014)
Ad Hoc Netw.
, vol.20
, pp. 96-112
-
-
Turkanović, M.1
Brumen, B.2
Hölbl, M.3
-
42
-
-
14844304757
-
-
Cuti, S.-f., Gardiner, C., Lynn, C., Kruus, P., Tinypk: securing sensor networks with public key technology, In: Proceedings of the 2nd ACM Workshop oSecurity of Ad hoc and Sensor Networks, ACM
-
Watro, R., Kong, D., Cuti, S.-f., Gardiner, C., Lynn, C., Kruus, P., Tinypk: securing sensor networks with public key technology, In: Proceedings of the 2nd ACM Workshop oSecurity of Ad hoc and Sensor Networks, ACM, pp. 59–64.
-
-
-
Watro, R.1
Kong, D.2
-
43
-
-
85012104670
-
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
-
Wu, F., Xu, L., Kumari, S., Li, X., An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimed. Syst., 2015.
-
(2015)
Multimed. Syst.
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
44
-
-
84936129205
-
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
-
Wu, F., Xu, L., Kumari, S., Li, X., Alelaiwi, A., A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur. Commun. Netw. 8 (2015), 3847–3863.
-
(2015)
Secur. Commun. Netw.
, vol.8
, pp. 3847-3863
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
Alelaiwi, A.5
-
45
-
-
85008349528
-
A new and secure authentication scheme for wireless sensor networks with formal proof
-
Wu, F., Xu, L., Kumari, S., Li, X., A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl., 2015.
-
(2015)
Peer-to-Peer Netw. Appl.
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
46
-
-
84942364844
-
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
-
Wu, F., Xu, L., Kumari, S., Li, X., A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45 (2015), 274–285.
-
(2015)
Comput. Electr. Eng.
, vol.45
, pp. 274-285
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
47
-
-
84978173214
-
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
-
Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R., A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9 (2016), 3527–3542.
-
(2016)
Secur. Commun. Netw.
, vol.9
, pp. 3527-3542
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
Das, A.K.5
Khan, M.K.6
Karuppiah, M.7
Baliyan, R.8
-
48
-
-
84992698502
-
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
-
Wu, F., Xu, L., Kumari, S., Li, X., A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Humaniz. Comput., 2016.
-
(2016)
J. Ambient Intell. Humaniz. Comput.
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
49
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
Xie, S., Wang, Y., Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78 (2014), 231–246.
-
(2014)
Wirel. Pers. Commun.
, vol.78
, pp. 231-246
-
-
Xie, S.1
Wang, Y.2
-
50
-
-
84963958402
-
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
-
Xu, L., Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39 (2015), 1–9.
-
(2015)
J. Med. Syst.
, vol.39
, pp. 1-9
-
-
Xu, L.1
Wu, F.2
-
51
-
-
84919348312
-
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
-
Xu, L., Wu, F., An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Netw. 8 (2015), 245–260.
-
(2015)
Secur. Commun. Netw.
, vol.8
, pp. 245-260
-
-
Xu, L.1
Wu, F.2
-
52
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue, K., Ma, C., Hong, P., Ding, R., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36 (2013), 316–323.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
53
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
Yoo, S.G., Park, K.Y., Kim, J., A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw., 2012.
-
(2012)
Int. J. Distrib. Sens. Netw.
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
|